The study employs Critical Discourse Analysis (CDA) to analyze how technological discourses are influenced by AI-generate d English texts. The research marries Fairclough’s three-dimensional discourse analysis, Van Dijk’s socio-cognitive approach, and Corpus-Assisted Discourse Studies (CADS) in the use of mixed-methods research, integrating primarily qualitative analysis with quantitative corpus-based data, to perform a thorough analysis of twenty AI-produced English texts. The findings identify the sophisticated linguistic mechanisms through which AI language employs modality, nominalization, passive voice, and interdiscursive blending to normalize and legitimize dominant contemporary ideologies. These mechanisms serve to legitimize te
... Show MoreThis study focuses on how tax administrations in Iraq use Artificial Intelligence (AI) techniques to monitor tax evasion for individuals and companies to achieve Tax Compliance (TC). AI was measured through four dimensions: Advanced Data Analytics Techniques (ADAT), Explainable AI (EAI), Machine learning (ML), and Robotic Process Automation (RPA). At the same time, TC was measured through registration, accounting, and tax payment stages. We relied on the questionnaire form to measure the variables. A sample of employees in the General Tax Authority in Iraq was selected, and a questionnaire was distributed to 132 people. The results indicated that the dimensions of AI affect achieving TC at all stages. This study provides evidence of using A
... Show MoreThe sale of facial features is a new modern contractual development that resulted from the fast transformations in technology, leading to legal, and ethical obligations. As the need rises for human faces to be used in robots, especially in relation to industries that necessitate direct human interaction, like hospitality and retail, the potential of Artificial Intelligence (AI) generated hyper realistic facial images poses legal and cybersecurity challenges. This paper examines the legal terrain that has developed in the sale of real and AI generated human facial features, and specifically the risks of identity fraud, data misuse and privacy violations. Deep learning (DL) algorithms are analyzed for their ability to detect AI genera
... Show MoreThe distribution of the expanded exponentiated power function EEPF with four parameters, was presented by the exponentiated expanded method using the expanded distribution of the power function, This method is characterized by obtaining a new distribution belonging to the exponential family, as we obtained the survival rate and failure rate function for this distribution, Some mathematical properties were found, then we used the developed least squares method to estimate the parameters using the genetic algorithm, and a Monte Carlo simulation study was conducted to evaluate the performance of estimations of possibility using the Genetic algorithm GA.
This study aims to reveal the role of one of the artificial intelligence (AI) techniques, “ChatGPT,” in improving the educational process by following it as a teaching method for the subject of automatic analysis for students of the Chemistry Department and the subject of computer security for students of the Computer Science Department, from the fourth stage at the College of Education for Pure Science (Ibn Al-Haitham), and its impact on their computational thinking to have a good educational environment. The experimental approach was used, and the research samples were chosen intentionally by the research community. Research tools were prepared, which included a scale for CT that included 12 items and the achievement test in b
... Show MoreArtificial intelligence (AI) offers significant benefits to biomedical research and academic writing. Nevertheless, using AI-powered writing aid tools has prompted worries about excessive dependence on these tools and their possible influence on writing proficiency. The current study aimed to explore the academic staff’s perspectives on the impact of AI on academic writing. This qualitative study incorporated in-person interviews with academic faculty members. The interviews were conducted in a semi-structured manner, using a predetermined interview guide consisting of open-ended questions. The interviews were done in person with the participants from May to November 2023. The data was analyzed using thematic analysis. Ten academics aged
... Show MoreTo date, comprehensive reviews and discussions of the strengths and limitations of Remote Sensing (RS) standalone and combination approaches, and Deep Learning (DL)-based RS datasets in archaeology have been limited. The objective of this paper is, therefore, to review and critically discuss existing studies that have applied these advanced approaches in archaeology, with a specific focus on digital preservation and object detection. RS standalone approaches including range-based and image-based modelling (e.g., laser scanning and SfM photogrammetry) have several disadvantages in terms of spatial resolution, penetrations, textures, colours, and accuracy. These limitations have led some archaeological studies to fuse/integrate multip
... Show MorePavement crack and pothole identification are important tasks in transportation maintenance and road safety. This study offers a novel technique for automatic asphalt pavement crack and pothole detection which is based on image processing. Different types of cracks (transverse, longitudinal, alligator-type, and potholes) can be identified with such techniques. The goal of this research is to evaluate road surface damage by extracting cracks and potholes, categorizing them from images and videos, and comparing the manual and the automated methods. The proposed method was tested on 50 images. The results obtained from image processing showed that the proposed method can detect cracks and potholes and identify their severity levels wit
... Show MoreThe rapid rise in the use of artificially generated faces has significantly increased the risk of identity theft in biometric authentication systems. Modern facial recognition technologies are now vulnerable to sophisticated attacks using printed images, replayed videos, and highly realistic 3D masks. This creates an urgent need for advanced, reliable, and mobile-compatible fake face detection systems. Research indicates that while deep learning models have demonstrated strong performance in detecting artificially generated faces, deploying these models on consumer mobile devices remains challenging due to limitations in computing power, memory, privacy, and processing speed. This paper highlights several key challenges: (1) optimiz
... Show More